Feeds

Configuration Management Databases: the big Reg survey

Wanna win a Reg goodie bag?

  • alert
  • submit to reddit

Remote control for virtualized desktops

Reg Technology Panel Those among you who'd like the chance to win a Reg goodie bag should take a few minutes to complete our survey on Configuration Management Databases - known as CMDBs to their mates - which form the focus of our latest tap into the expertise of you, our beloved readers.

Ok, we admit: CMDBs may not be everyone's idea of a wild night out, but according to those in the know, they're increasingly the way to know "what is in your IT infrastructure and how it all hangs together". Indeed, our local CMDB expert reckons "some organisations get into them because they have to as part of a best practice strategy, others take them on board to simply help them manage and evolve their IT service delivery".

Well, that's what we think he said, because we sort of wandered off in a daze halfway through his detailed blow-by-blow account of why CMDBs will make the world a better place for your children and your children's children, etc, etc.

You can get to the survey (25 questions, by our count) right here. You don't need to have any more than a vague notion of what on Earth CMDBs do to participate, and if you provide your email addy (optional, and we won't sell it to Viagra spammers, we promise), you'll be entered into the goodie bag prize draw. Happy surveying. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
BT said to have pulled patent-infringing boxes from DSL network
Take your license demand and stick it in your ASSIA
Right to be forgotten should apply to Google.com too: EU
And hey - no need to tell the website you've de-listed. That'll make it easier ...
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.